Searched refs:obuf (Results 1 - 25 of 86) sorted by relevance

1234

/macosx-10.9.5/mail_cmds-29/mail/
H A Dquit.c78 FILE *ibuf = NULL, *obuf = NULL, *fbuf, *rbuf, *readstat = NULL, *abuf; local
211 (obuf = Fdopen(fd, "w")) == NULL) {
219 (void)Fclose(obuf);
226 (void)putc(c, obuf);
229 if (ferror(obuf)) {
232 (void)Fclose(obuf);
236 (void)Fclose(obuf);
238 if ((obuf = Fopen(mbox, "r+")) == NULL) {
246 if ((obuf = Fopen(mbox, "a")) == NULL) {
251 (void)fchmod(fileno(obuf), 060
346 FILE *obuf; local
399 FILE *obuf, *ibuf, *readstat = NULL; local
[all...]
H A Dsend.c61 sendmessage(mp, obuf, doign, prefix)
63 FILE *obuf;
111 statusput(mp, obuf, prefix);
140 statusput(mp, obuf, prefix);
145 (void)putc('\n', obuf);
163 statusput(mp, obuf, prefix);
181 fputs(prefix, obuf);
184 prefixlen, obuf);
186 (void)fwrite(line, sizeof(*line), length, obuf);
187 if (ferror(obuf))
[all...]
H A Dcmd1.c307 FILE *obuf; local
309 obuf = stdout;
323 obuf = Popen(cp, "w");
324 if (obuf == NULL) {
326 obuf = stdout;
341 fprintf(obuf, "Message %d:\n", *ip);
342 (void)sendmessage(mp, obuf, doign ? ignore : 0, NULL);
346 if (obuf != stdout) {
351 (void)Pclose(obuf);
H A Dcmd2.c204 FILE *obuf; local
242 if ((obuf = Fopen(file, "a")) == NULL) {
249 if (sendmessage(mp, obuf, ignore, NULL) < 0) {
251 (void)Fclose(obuf);
257 (void)fflush(obuf);
258 if (ferror(obuf))
260 (void)Fclose(obuf);
H A Dfio.c172 putline(obuf, linebuf, outlf)
173 FILE *obuf;
180 (void)fwrite(linebuf, sizeof(*linebuf), c, obuf);
182 fprintf(obuf, "\n");
185 if (ferror(obuf))
/macosx-10.9.5/curl-78.94.1/curl/lib/
H A Dbase64.c164 unsigned char obuf[4]; local
209 obuf[0] = (unsigned char) ((ibuf[0] & 0xFC) >> 2);
210 obuf[1] = (unsigned char) (((ibuf[0] & 0x03) << 4) | \
212 obuf[2] = (unsigned char) (((ibuf[1] & 0x0F) << 2) | \
214 obuf[3] = (unsigned char) (ibuf[2] & 0x3F);
219 table64[obuf[0]],
220 table64[obuf[1]]);
224 table64[obuf[0]],
225 table64[obuf[1]],
226 table64[obuf[
[all...]
/macosx-10.9.5/text_cmds-87/ul/
H A Dul.c85 struct CHAR obuf[MAXBUF]; variable in typeref:struct:CHAR
242 if (obuf[col].c_char || obuf[col].c_width < 0) {
243 while (col > 0 && obuf[col].c_width < 0)
245 w = obuf[col].c_width;
247 obuf[col++].c_mode |= UNDERL | mode;
252 obuf[col].c_char = '_';
253 obuf[col].c_width = 1;
273 if (obuf[col].c_char == '\0') {
274 obuf[co
[all...]
/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/
H A Dexample_evp_cipher.c70 void *ibuf, *obuf; local
112 obuf = malloc(block_size + EVP_CIPHER_block_size(c));
124 ret = EVP_CipherUpdate(&ctx, obuf, &olen, ibuf, ilen);
130 fwrite(obuf, 1, olen, out);
136 ret = EVP_CipherFinal_ex(&ctx, obuf, &olen);
142 fwrite(obuf, 1, olen, out);
/macosx-10.9.5/Heimdal-323.92.1/appl/telnet/telnet/
H A Dnetwork.c49 void *obuf, *ibuf; local
51 if ((obuf = malloc(netobufsize)) == NULL)
56 if (ring_init(&netoring, obuf, netobufsize) != 1) {
/macosx-10.9.5/less-23/less/
H A Doutput.c77 static char obuf[OUTBUF_SIZE]; variable
78 static char *ob = obuf;
102 n = ob - obuf;
110 _outtext(obuf);
111 ob = obuf;
120 WIN32textout(obuf, ob - obuf);
150 for (anchor = p_next = obuf;
201 strcpy(obuf, anchor);
202 ob = &obuf[slo
[all...]
/macosx-10.9.5/Libc-997.90.3/net/FreeBSD/
H A Dlinkaddr.c127 static char obuf[64]; local
128 char *out = obuf;
135 bcopy(sdl->sdl_data, obuf, sdl->sdl_nlen);
155 return (obuf);
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/libdes/src/
H A Ddes.c384 /* crypto/des/des.c */ /* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au) * All rights reserved. * * This package is an SSL implementation written * by Eric Young (eay@mincom.oz.au). * The implementation was written so as to conform with Netscapes SSL. * * This library is free for commercial and non-commercial use as long as * the following conditions are aheared to. The following conditions * apply to all code found in this distribution, be it the RC4, RSA, * lhash, DES, etc., code; not just the SSL code. The SSL documentation * included with this distribution is covered by the same copyright terms * except that the holder is Tim Hudson (tjh@mincom.oz.au). * * Copyright remains Eric Young's, and as such any Copyright notices in * the code are not to be removed. * If this package is used in a product, Eric Young should be given attribution * as the author of the parts of the library used. * This can be in the form of a textual message at program startup or * in documentation (online or textual) provided with the package. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * "This product includes cryptographic software written by * Eric Young (eay@mincom.oz.au)" * The word 'cryptographic' can be left out if the rouines from the library * being used are not cryptographic related :-). * 4. If you include any Windows specific code (or a derivative thereof) from * the apps directory (application code) you must include an acknowledgement: * "This product includes software written by Tim Hudson (tjh@mincom.oz.au)" * * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] */ #ifdef HAVE_CONFIG_H #include <config.h> #endif #include <stdio.h> #include <stdlib.h> #include <string.h> #ifdef HAVE_UNISTD_H #include <unistd.h> #endif #ifdef HAVE_IO_H #include <io.h> #endif #include <time.h> #include "des_ver.h" #ifdef VMS #include <types.h> #include <stat.h> #endif #ifdef HAVE_SYS_TYPES_H #include <sys/types.h> #endif #ifdef HAVE_SYS_STAT_H #include <sys/stat.h> #endif #include "des.h" #ifndef HAVE_RANDOM #define random rand #define srandom(s) srand(s) #endif #ifndef NOPROTO void usage(void); void doencryption(void); int uufwrite(unsigned char *data, int size, unsigned int num, FILE *fp); void uufwriteEnd(FILE *fp); int uufread(unsigned char *out,int size,unsigned int num,FILE *fp); int uuencode(unsigned char *in,int num,unsigned char *out); int uudecode(unsigned char *in,int num,unsigned char *out); #else void usage(); void doencryption(); int uufwrite(); void uufwriteEnd(); int uufread(); int uuencode(); int uudecode(); #endif #ifdef VMS #define EXIT(a) exit(a&0x10000000) #else #define EXIT(a) exit(a) #endif #define BUFSIZE (8*1024) #define VERIFY 1 #define KEYSIZ 8 #define KEYSIZB 1024 /* should hit tty line limit first :-) */ char key[KEYSIZB+1]; int do_encrypt,longk=0; FILE *DES_IN,*DES_OUT,*CKSUM_OUT; char uuname[200]; unsigned char uubuf[50]; int uubufnum=0; #define INUUBUFN (45*100) #define OUTUUBUF (65*100) unsigned char b[OUTUUBUF]; unsigned char bb[300]; des_cblock cksum={0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00}; char cksumname[200]=""; int vflag,cflag,eflag,dflag,kflag,bflag,fflag,sflag,uflag,flag3,hflag,error; int main(argc, argv) int argc; char **argv; { int i; struct stat ins,outs; char *p; char *in=NULL,*out=NULL; vflag=cflag=eflag=dflag=kflag=hflag=bflag=fflag=sflag=uflag=flag3=0; error=0; memset(key,0,sizeof(key)); for (i=1; i<argc; i++) { p=argv[i]; if ((p[0] == '-') && (p[1] != '\0')) { p++; while (*p) { switch (*(p++)) { case '3': flag3=1; longk=1; break; case 'c': cflag=1; strncpy(cksumname,p,200); p+=strlen(cksumname); break; case 'C': cflag=1; longk=1; strncpy(cksumname,p,200); p+=strlen(cksumname); break; case 'e': eflag=1; break; case 'v': vflag=1; break; case 'E': eflag=1; longk=1; break; case 'd': dflag=1; break; case 'D': dflag=1; longk=1; break; case 'b': bflag=1; break; case 'f': fflag=1; break; case 's': sflag=1; break; case 'u': uflag=1; strncpy(uuname,p,200); p+=strlen(uuname); break; case 'h': hflag=1; break; case 'k': kflag=1; if ((i+1) == argc) { fputs("must have a key with the -k option\n",stderr); error=1; } else { int j; i++; strncpy(key,argv[i],KEYSIZB); for (j=strlen(argv[i])-1; j>=0; j--) argv[i][j]='\0'; } break; default: fprintf(stderr,"'%c' unknown flag\n",p[-1]); error=1; break; } } } else { if (in == NULL) in=argv[i]; else if (out == NULL) out=argv[i]; else error=1; } } if (error) usage(); /* We either * do checksum or * do encrypt or * do decrypt or * do decrypt then ckecksum or * do checksum then encrypt */ if (((eflag+dflag) == 1) || cflag) { if (eflag) do_encrypt=DES_ENCRYPT; if (dflag) do_encrypt=DES_DECRYPT; } else { if (vflag) { #ifndef _Windows fprintf(stderr,"des(1) built with %s\n",libdes_version); #endif EXIT(1); } else usage(); } #ifndef _Windows if (vflag) fprintf(stderr,"des(1) built with %s\n",libdes_version); #endif if ( (in != NULL) && (out != NULL) && #ifndef MSDOS (stat(in,&ins) != -1) && (stat(out,&outs) != -1) && (ins.st_dev == outs.st_dev) && (ins.st_ino == outs.st_ino)) #else /* MSDOS */ (strcmp(in,out) == 0)) #endif { fputs("input and output file are the same\n",stderr); EXIT(3); } if (!kflag) if (des_read_pw_string(key,KEYSIZB+1,"Enter key:",eflag?VERIFY:0)) { fputs("password error\n",stderr); EXIT(2); } if (in == NULL) DES_IN=stdin; else if ((DES_IN=fopen(in,"r")) == NULL) { perror("opening input file"); EXIT(4); } CKSUM_OUT=stdout; if (out == NULL) { DES_OUT=stdout; CKSUM_OUT=stderr; } else if ((DES_OUT=fopen(out,"w")) == NULL) { perror("opening output file"); EXIT(5); } #ifdef MSDOS /* This should set the file to binary mode. */ { #include <fcntl.h> if (!(uflag && dflag)) setmode(fileno(DES_IN),O_BINARY); if (!(uflag && eflag)) setmode(fileno(DES_OUT),O_BINARY); } #endif doencryption(); fclose(DES_IN); fclose(DES_OUT); EXIT(0); } void usage() { char **u; static const char *Usage[]={ "des <options> [input-file [output-file]]", "options:", "-v : des(1) version number", "-e : encrypt using sunOS compatible user key to DES key conversion.", "-E : encrypt ", "-d : decrypt using sunOS compatible user key to DES key conversion.", "-D : decrypt ", "-c[ckname] : generate a cbc_cksum using sunOS compatible user key to", " DES key conversion and output to ckname (stdout default,", " stderr if data being output on stdout). The checksum is", " generated before encryption and after decryption if used", " in conjunction with -[eEdD].", "-C[ckname] : generate a cbc_cksum as for -c but compatible with -[ED].", "-k key : use key 'key'", "-h : the key that is entered will be a hexidecimal number", " that is used directly as the des key", "-u[uuname] : input file is uudecoded if -[dD] or output uuencoded data if -[eE]", " (uuname is the filename to put in the uuencode header).", "-b : encrypt using DES in ecb encryption mode, the defaut is cbc mode.", "-3 : encrypt using tripple DES encryption. This uses 2 keys", " generated from the input key. If the input key is less", " than 8 characters long, this is equivelent to normal", " encryption. Default is tripple cbc, -b makes it tripple ecb.", NULL }; for (u=(char **)Usage; *u; u++) { fputs(*u,stderr); fputc('\n',stderr); } EXIT(1); } void doencryption() { #ifdef _LIBC extern int srandom(); extern int random(); extern unsigned long time(); #endif register int i; des_key_schedule ks,ks2; unsigned char iv[8],iv2[8]; char *p; int num=0,j,k,l,rem,ll,len,last,ex=0; des_cblock kk,k2; FILE *O; int Exit=0; #ifndef MSDOS static unsigned char buf[BUFSIZE+8],obuf[BUFSIZE+8]; #else static unsigned char *buf=NULL,*obuf=NULL; if (buf == NULL) { if ( (( buf=(unsigned char *)Malloc(BUFSIZE+8)) == NULL) || ((obuf=(unsigned char *)Malloc(BUFSIZE+8)) == NULL)) { fputs("Not enough memory\n",stderr); Exit=10; goto problems; } } #endif if (hflag) { j=(flag3?16:8); p=key; for (i=0; i<j; i++) { k=0; if ((*p <= '9') && (*p >= '0')) k=(*p-'0')<<4; else if ((*p <= 'f') && (*p >= 'a')) k=(*p-'a'+10)<<4; else if ((*p <= 'F') && (*p >= 'A')) k=(*p-'A'+10)<<4; else { fputs("Bad hex key\n",stderr); Exit=9; goto problems; } p++; if ((*p <= '9') && (*p >= '0')) k|=(*p-'0'); else if ((*p <= 'f') && (*p >= 'a')) k|=(*p-'a'+10); else if ((*p <= 'F') && (*p >= 'A')) k|=(*p-'A'+10); else { fputs("Bad hex key\n",stderr); Exit=9; goto problems; } p++; if (i < 8) kk[i]=k; else k2[i-8]=k; } des_set_key((C_Block *)k2,ks2); memset(k2,0,sizeof(k2)); } else if (longk || flag3) { if (flag3) { des_string_to_2keys(key,(C_Block *)kk,(C_Block *)k2); des_set_key((C_Block *)k2,ks2); memset(k2,0,sizeof(k2)); } else des_string_to_key(key,(C_Block *)kk); } else for (i=0; i<KEYSIZ; i++) { l=0; k=key[i]; for (j=0; j<8; j++) { if (k&1) l++; k>>=1; } if (l & 1) kk[i]=key[i]&0x7f; else kk[i]=key[i]|0x80; } des_set_key((C_Block *)kk,ks); memset(key,0,sizeof(key)); memset(kk,0,sizeof(kk)); /* woops - A bug that does not showup under unix :-( */ memset(iv,0,sizeof(iv)); memset(iv2,0,sizeof(iv2)); l=1; rem=0; /* first read */ if (eflag || (!dflag && cflag)) { for (;;) { num=l=fread(&(buf[rem]),1,BUFSIZE,DES_IN); l+=rem; num+=rem; if (l < 0) { perror("read error"); Exit=6; goto problems; } rem=l%8; len=l-rem; if (feof(DES_IN)) { srandom((unsigned int)time(NULL)); for (i=7-rem; i>0; i--) buf[l++]=random()&0xff; buf[l++]=rem; ex=1; len+=rem; } else l-=rem; if (cflag) { des_cbc_cksum((C_Block *)buf,(C_Block *)cksum, (long)len,ks,(C_Block *)cksum); if (!eflag) { if (feof(DES_IN)) break; else continue; } } if (bflag && !flag3) for (i=0; i<l; i+=8) des_ecb_encrypt( (des_cblock *)&(buf[i]), (des_cblock *)&(obuf[i]), ks,do_encrypt); else if (flag3 && bflag) for (i=0; i<l; i+=8) des_ecb2_encrypt( (des_cblock *)&(buf[i]), (des_cblock *)&(obuf[i]), ks,ks2,do_encrypt); else if (flag3 && !bflag) { char tmpbuf[8]; if (rem) memcpy(tmpbuf,&(buf[l]), (unsigned int)rem); des_3cbc_encrypt( (des_cblock *)buf,(des_cblock *)obuf, (long)l,ks,ks2,(des_cblock *)iv, (des_cblock *)iv2,do_encrypt); if (rem) memcpy(&(buf[l]),tmpbuf, (unsigned int)rem); } else { des_cbc_encrypt( (des_cblock *)buf,(des_cblock *)obuf, (long)l,ks,(des_cblock *)iv,do_encrypt); if (l >= 8) memcpy(iv,&(obuf[l-8]),8); } if (rem) memcpy(buf,&(buf[l]),(unsigned int)rem); i=0; while (i < l) { if (uflag) j=uufwrite(obuf,1,(unsigned int)l-i, DES_OUT); else j=fwrite(obuf,
1 /* crypto/des/des.c */ local
[all...]
/macosx-10.9.5/apache-786.1/httpd/modules/debug/
H A Dmod_dumpio.c65 char *obuf; local
68 obuf = malloc(nbytes+1); /* use pool? */
69 memcpy(obuf, buf, nbytes);
71 ap_xlate_proto_from_ascii(obuf, nbytes);
73 obuf[nbytes] = '\0';
79 obuf);
80 free(obuf);
/macosx-10.9.5/ksh-20/ksh/src/lib/libast/sfio/
H A Dsfsetbuf.c111 uchar* obuf = NIL(uchar*); local
167 { obuf = f->data;
196 obuf = f->data;
358 if(obuf && size == (size_t)osize && init)
359 { buf = (Void_t*)obuf;
360 obuf = NIL(uchar*);
398 if(obuf && obuf != f->data && osize > 0 && (oflags&SF_MALLOC))
399 { free((Void_t*)obuf);
400 obuf
[all...]
/macosx-10.9.5/system_cmds-597.90.1/passwd.tproj/
H A Dpasswd.c51 static char obuf[_PASSWORD_LEN+1]; local
71 //strcpy(obuf, p);
72 snprintf( obuf, sizeof(obuf), "%s", p );
143 *old_clear = obuf;
/macosx-10.9.5/system_cmds-597.90.1/system_cmds-597.1.1/passwd.tproj/
H A Dpasswd.c51 static char obuf[_PASSWORD_LEN+1]; local
71 //strcpy(obuf, p);
72 snprintf( obuf, sizeof(obuf), "%s", p );
143 *old_clear = obuf;
/macosx-10.9.5/tcl-102/tcl_ext/tkimg/tkimg/compat/libtiff/tools/
H A Dpal2rgb.c177 { unsigned char *ibuf, *obuf; local
181 obuf = (unsigned char*)_TIFFmalloc(TIFFScanlineSize(out));
187 pp = obuf;
193 if (!TIFFWriteScanline(out, obuf, row, 0))
201 for (pp = obuf, x = 0; x < imagewidth; x++)
203 if (!TIFFWriteScanline(out, obuf, row, 0))
205 for (pp = obuf, x = 0; x < imagewidth; x++)
207 if (!TIFFWriteScanline(out, obuf, row, 0))
209 for (pp = obuf, x = 0; x < imagewidth; x++)
211 if (!TIFFWriteScanline(out, obuf, ro
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/regressions/
H A Dssl-44-crashes.c177 unsigned char ibuf[8], obuf[8]; local
180 SecRandomCopyBytes(kSecRandomDefault, sizeof(obuf), obuf);
181 require_noerr_quiet(ortn = SSLWrite(ctx, obuf, sizeof(obuf), &len), out);
182 require_action_quiet(len == sizeof(obuf), out, ortn = -1);
/macosx-10.9.5/screen-22/screen/
H A Dbraille_tsi.c94 char obuf[3],ibuf[20]; local
97 obuf[0] = 0xff;
98 obuf[1] = 0xff;
99 obuf[2] = 0x0a;
101 r = write(bd.bd_fd, obuf, 3);
/macosx-10.9.5/shell_cmds-175/script/
H A Dscript.c95 char obuf[BUFSIZ]; local
202 cc = read(master, obuf, sizeof (obuf));
205 (void)write(STDOUT_FILENO, obuf, cc);
206 (void)fwrite(obuf, 1, cc, fscript);
/macosx-10.9.5/text_cmds-87/ed/
H A Dcbc.c229 * obuf bit pattern
233 expand_des_key(char *obuf, char *kbuf) argument
252 obuf[i] =
273 obuf[i] = (obuf[i]<<1)|nbuf[8*i+j];
281 (void)strncpy(obuf, kbuf, 8);
/macosx-10.9.5/rsync-42/rsync/
H A Dtoken.c154 static char *obuf; variable
156 /* We want obuf to be able to hold both MAX_DATA_COUNT+2 bytes as well as
184 if ((obuf = new_array(char, OBUF_SIZE)) == NULL)
231 tx_strm.next_out = (Bytef *)(obuf + 2);
240 obuf+MAX_DATA_COUNT-2, 4);
263 obuf[0] = DEFLATED_DATA + (n >> 8);
264 obuf[1] = n;
265 write_buf(f, obuf, n+2);
285 tx_strm.next_out = (Bytef *) obuf;
/macosx-10.9.5/remote_cmds-41.90.1/rlogin.tproj/
H A Drlogin.c732 char obuf[4 + sizeof (struct winsize)]; local
734 wp = (struct winsize *)(obuf+4);
735 obuf[0] = 0377;
736 obuf[1] = 0377;
737 obuf[2] = 's';
738 obuf[3] = 's';
746 (void)des_write(rem, obuf, sizeof(obuf));
749 (void)write(rem, obuf, sizeof(obuf));
[all...]
/macosx-10.9.5/zsh-60/zsh/Src/Zle/
H A Dzle_refresh.c639 *obuf = NULL; /* old video buffer line-by-line array */ variable
674 zfree(obuf[ln], (winw_alloc + 2) * sizeof(**obuf));
677 free(obuf);
685 obuf = NULL;
708 obuf = (REFRESH_STRING *)zshcalloc((winh + 1) * sizeof(*obuf));
710 obuf[0] = (REFRESH_STRING)zalloc((winw + 2) * sizeof(**obuf));
729 if (obuf[l
[all...]
/macosx-10.9.5/BerkeleyDB-21/db/hash/
H A Dhash_upgrade.c23 __ham_30_hashmeta(dbp, real_name, obuf)
26 u_int8_t *obuf;
38 oldmeta = (HASHHDR *)obuf;

Completed in 211 milliseconds

1234